AFCEA Technet 2007 The need for security

Slides:



Advertisements
Similar presentations
Network Security Chapter 1 - Introduction.
Advertisements

Mr. Mark S. Loepker Colonel Enrico Bologna SC/4 Co-Chairmen
Cryptography and Network Security 2 nd Edition by William Stallings Note: Lecture slides by Lawrie Brown and Henric Johnson, Modified by Andrew Yang.
Improving Cybersecurity Through Research & Innovation Dr. Steve Purser Head of Technical Competence Department European Network and Information Security.
CYBERSPACE A Global War-fighting Domain Every minute of every day, Airmen in the United States Air Force are flying and fighting in cyberspace.
Australia and Cyber Warfare by Ian Dudgeon A presentation to the AIIA Queensland Branch 14 June 2011.
1 CISR-consultancy Challenges “Customer ask us what to do next” Keywords: “Customer ask us what to do next” From Policy to Practise The world is going.
Chapter 1 – Introduction
1 Cryptography and Network Security Third Edition by William Stallings Lecturer: Dr. Saleem Al_Zoubi.
NATO Network Enabled Capabilities
Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming, but on our own readiness to receive him; not.
Cryptography and Network Security Chapter 1. Chapter 1 – Introduction The art of war teaches us to rely not on the likelihood of the enemy's not coming,
Cryptography and Network Security Third Edition by William Stallings Lecture slides by Lawrie Brown.
Stephen S. Yau CSE , Fall Security Strategies.
Cryptography and Network Security Chapter 1 Fourth Edition by William Stallings Lecture slides by Lawrie Brown.
1 Cryptography and Network Security Fourth Edition by William Stallings Lecture slides by Lawrie Brown Changed by: Somesh Jha [Lecture 1]
SEC835 Database and Web application security Information Security Architecture.
Cryptography and Network Security Overview & Chapter 1 Fifth Edition by William Stallings Lecture slides by Lawrie Brown.
Dr. Lo’ai Tawalbeh 2007 INCS 741: Cryptography Chapter 1:Introduction Dr. Lo’ai Tawalbeh New York Institute of Technology (NYIT) Jordan’s Campus
Presentation title SUB TITLE HERE Intelligent 21st Century Strategies for Broadband and Cyber Infrastructures Security By Dr. Emmanuel Hooper, PhD, PhD,
Protective Measures at NATO Headquarters Ian Davis Head, Information Systems Service NATO Headquarters Brussels, Belgium.
1 NATO HQ C 3 Staff The NATO HQ need for the Web: How policy requirements are affected by the need to take web development into account Georges D’hollander.
Cryptography and Network Security
Eng. Wafaa Kanakri Second Semester 1435 CRYPTOGRAPHY & NETWORK SECURITY Chapter 1:Introduction Eng. Wafaa Kanakri UMM AL-QURA UNIVERSITY
PREPAREDNESS AND RESPONSE TO CYBER THREATS REQUIRE A CSIRT By Jaco Robertson, Marthie Lessing and Simon Nare*
E-Security: 10 Steps to Protect Your School’s Network NEN – the education network.
Certification and Accreditation CS Phase-1: Definition Atif Sultanuddin Raja Chawat Raja Chawat.
PRESENTED BY P. PRAVEEN Roll No: 1009 – 11 – NETWORK SECURITY M.C.A III Year II Sem.
IT Strategy for Business © Oxford University Press 2008 All rights reserved Chapter 12 IT Security Strategies.
1 University of Palestine Information Security Principles ITGD 2202 Ms. Eman Alajrami 2 nd Semester
ITU CoE/ARB 11 th Annual Meeting of the Arab Network for Human Resources 16 – 18 December 2003; Khartoum - Sudan 1 The content is based on New OECD Guidelines.
1 Chapter 1 – Background Computer Security T/ Tyseer Alsamany - Computer Security.
Topic 1 – Introduction Huiqun Yu Information Security Principles & Applications.
ESRIF European Security Research and Innovation Forum Giancarlo Grasso, Finmeccanica ESRIF DEPUTY CHAIRMAN.
Cryptography and Network Security Chapter 1. Background  Information Security requirements have changed in recent times  traditionally provided by physical.
1 Network Security: Introduction Behzad Akbari Fall 2009 In the Name of the Most High.
By Marwan Al-Namari & Hafezah Ben Othman Author: William Stallings College of Computer Science at Al-Qunfudah Umm Al-Qura University, KSA, Makkah 1.
Sicherheitsaspekte beim Betrieb von IT-Systemen Christian Leichtfried, BDE Smart Energy IBM Austria December 2011.
Cognitive & Organizational Challenges of Big Data in Cyber Defence. YALAVARTHI ANUSHA 1.
EUROPEAN SECURITY POLICY A SNAPSHOT ON SURVEILLANCE AND PRIVACY DESSI WORKSHOP, CPH 24 JUNE 2014 Birgitte Kofod Olsen, Chair Danish Council for Digital.
1 Network Security Maaz bin ahmad.. 2 Outline Attacks, services and mechanisms Security attacks Security services Security Mechanisms A model for Internetwork.
Risk Controls in IA Zachary Rensko COSC 481. Outline Definition Risk Control Strategies Risk Control Categories The Human Firewall Project OCTAVE.
Lecture 1 Introduction Dr. nermin hamza 1. Aim of Course Overview Cryptography Symmetric and Asymmetric Key management Researches topics 2.
Security and resilience for Smart Hospitals Key findings
Cryptography and Network Security
CS457 Introduction to Information Security Systems
Continuous Delivery- Complete Guide
Data and database administration
Architectures in Support of Capability Development
Cryptography and Network Security
Information Security.
DISA Global Operations
Introduction to Information Security
Trends in my profession, Information Technology
Security Engineering.
Speaker’s Name, SAP Month 00, 2017
CIS 333Competitive Success/tutorialrank.com
CIS 333 Education for Service-- tutorialrank.com.
CONFIDENTIALITY, INTEGRITY, LEGAL INTERCEPTION
Cryptography and Network Security Chapter 1
Qishi Wu University of Memphis
Cryptography and Network Security
Andrew Hinchley CPL Consulting
Scotland’s Digital Health and Care Strategy
Cybersecurity ATD technical
Computer Security CIS326 Dr Rachel Shipsey.
Cryptography and Network Security Chapter 1
Cryptography and Network Security
Computer Security CIS326 Dr Rachel Shipsey.
Chapter 5 Computer Security
Presentation transcript:

AFCEA Technet 2007 The need for security Georges D’hollander Maj Gen, BELAR Director, NHQ C3 Staff, and also Vice-Chairman NC3 Board AFCEA Technet Europe Helsinki, 18 October 2007 Thank you, Mr Chairman. As we are limited in time, I will focus on two topics that are of high importance to NATO at the moment. By the way, both topics will be on the agenda of the upcoming Informal Defence Ministerial in Noordwijk, the Netherlands, next week. (next) “To drive the provision of enhanced Alliance C3 capabilities in support of the common values of NATO”

Securing Information Information Let me to introduce these topics. Secure information is nothing new, we have been doing it for centuries. What is new however and what has dramatically changed for NATO since the Cold War era, is that we now live in an information technology age. This affects military personnel both as individuals - because we already use IT in our private lives – but also as commanders because we have to command and control more sensors, a wider variety of weapon systems, we have more dispersed troops, etc. and therefore more co-ordination is needed and we deal with bigger information flows. This means that we have to transform. Let’s see how Information Assurance fits into NATO’s transformation. [click] The enemy, who is unknown, fights an asymmetric war, has the same access to public information as we do and amply exploits the communication strategy (for example the Taliban in Afghanistan). Old-fashioned fortresses no longer protect hidden treasures. Also, our society has changed and needs more information. For example : with banking, every one can transfer money without going to the bank; administrations are now proposing modern public services via the Internet, etc. Some nations are deeply engaged in the digitisation of the real life of their citizens. A good example is Estonia. But because we use more open capabilities such as the internet, we become more vulnerable. This brings me to the 2nd part of my presentation on cyber defence. [next]

INFORMATION SUPERIORITY NETWORK ENABLED CAPABILITY Interconnectivity How to Transform Effects-based Approach to Operations Transformation Objective Area Capabilities Collect DATA / INFO (INTEL) INFORMATION ASSURANCE Management Information Management EFFECTIVE ENGAGEMENT EFFECTIVE ENGAGEMENT Let us start with transformation. On the slide you see the battlefield of today. It is very complex. The business of NATO and especially the business of the Commander is to achieve the best Decision Making process to effectively conduct an Effects-Based Approach to Operations. Therefore, we have to fuse, analyze and disseminate large amounts of data. [click] The ultimate aim is of transformation is effective engagement. In order to reach this objective, we need to be securely interconnected. That’s the aim of NATO Network Enabled Capability (NNEC). If we want to implement NNEC, we need policies and procedures, architecture and networks, systems, standards and spectrum. The latter is fast becoming a scarce resource. Interoperability and interconnectivity have become key words. Being networked, we achieve Information and knowledge superiority. With this, we decide better and faster, to obtain Decision Superiority. Finally, we achieve effects superiority. On the technical side, NNEC is supported by a Networking Information Infrastructure (NII). The power of this puzzle relies on the coherent management of many different components and as you can see on the screen, Information Assurance is one of them. [next] Collect DATA / INFO (INTEL) Spectrum Management DECISION SUPERIORITY INTEL INFORMATION SUPERIORITY Fuse DATA / INFO Spectrum Analyse DATA / INFO NETWORK ENABLED CAPABILITY Standards Interconnectivity Disseminate DATA / INFO Hardware / Systems Interoperability Architecture / Networks Policies & Procedures Infrastructure / Architecture Management

INFOSEC / Information Assurance Here you see the functional view of NNEC with its 6 layers (4 horizontal and 2 vertical). The vertical ones apply to all horizontal layers. The 2 lower layers constitute the NII that I just mentioned. Let us now focus on Information Assurance. The definition of INFOSEC is based on the concept of CIA (confidentiality, integrity, availability) and is still valid and used. Whereas INFOSEC seems to be a limiting term, the new term Information Assurance (IA) is seen as a much broader term, a NNEC enabling factor, and it has additional aspects such as authentication and non-repudiation, as well as protection, detection, reaction and restoration. This term is in the process of being adopted within NATO. [click] In order to create a secure and flexible NII, the communications core has to be expanded and must provide the appropriate security services. The Protected core network concept should be able to guarantee quality of service at a level currently not yet achieved by commercial best-effort initiatives. This will require immediate handling of unauthorised traffic inserted into the network. And that means that the network should provide end-to-end services that ensure e.g. the proper Quality of Service. In the long term, solutions will support timely and secure bi-directional information exchange between trusted and less trusted domains, including public networks. Access control at domain boundaries will be based on object meta-data, user roles and an adaptive security policy. Complex data formats, including executable code, can be exchanged. Supporting the concept of an expanding core, solutions can reside in end-systems or in dedicated gateways. The solutions will have a high assurance of secure operation. Of course, secure flexible transport services and secure dynamic information sharing will need to be managed. The security management and cyber defence is to achieve a cyber C2 capability where all the mechanisms and devices can be managed as well as defended. [next] Information Assurance Users & Missions Service Management & Control Funct Serv TOAs Secure and Dynamic Information Sharing Community of Interest Security Management & Cyber-defence COP SI Information Integration CES XML Registry N I Secure and Flexible Transport Services Networking & Information Infrastructure (NII) Communications waveforms SDR IP, SCIP

Some Ways to Acquire Information… Cyber threats Some Ways to Acquire Information… Let me now come to my second topic, namely cyber defence. NATO takes the issue of cyber security very seriously. Recent incidents have raised the profile of this topic in NATO. We defend against cyber attacks that are specifically targeted at NATO, such as viruses and other malicious software, but also denial of services attacks, originated from botnets (sets of zombies computers) established or rented by attackers. Just like many other organizations with public exposure, NATO experiences frequent attempts to break into its public-facing computer networks. And we see this on a regular basis. Risks to cyber space and computer networks are increasing with the increased complexity and interconnections of computer networks. [next] One Way to Attack a Target… …Another Way

NATO’s Cyber Defence initiative FOC The aim for NATO’s Cyber Defence initiative is to implement a NATO-wide Cyber Defence capability able to prevent, detect, respond and recover from cyber attacks against the information systems of critical importance to the Alliance in a cyber defence scenario requiring readiness, effectiveness and short decision-making processes. [click] The NATO Communication and Information Systems Services Agency (NCSA) is NATO’s first line of operational defence against cyber attacks. NCSA operates both the NATO Information Security Operations Centre and the NATO Computer Incident Response Capability Technical Centre, providing an integrated and highly synergistic cyber defence organisation. These centres will operate 24 hours a day, seven days a week all year round. The NATO Computer Incident Response Capability Technical Centre provides NATO with a range of highly specialised computer services, including incident detection, response and recovery that help ensure the security of NATO communication and information systems.  These services are delivered across the whole of the NATO CIS landscape, encompassing both operational and static locations. The way ahead includes an enhanced and more powerful capability originated from the recommendations of the Interim Operational Capability phase of NCIRC, lessons learned from the Estonian cyber attacks AND decisions from high level committees and authorities such as the recommendations included in the EWG report to the NAC, the recommendations of NHQC3S to the NC3B and the NAC harmonizing NCSA, EWG and IMS sets of recommendations and finally the consideration of CD as a strategic issue for the Director IMS. [next] NCIRC Bodies nation nation nation operations

AFCEA Technet 2007 The need for security Any question ? AFCEA Technet 2007 The need for security Georges D’hollander Maj Gen, BEAR Director, NHQ C3 Staff, and also Vice-Chairman NC3 Board AFCEA Location, Date 2007 Ladies and gentlemen, this concludes my presentation and I stand ready to take questions when the time is appropriate. “To drive the provision of enhanced Alliance C3 capabilities in support of the common values of NATO”